A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.

Slides:



Advertisements
Similar presentations
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Advertisements

IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Communication Service Identifier Requirements on SIP draft-loreto-3gpp-ics-requirements.txt
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
All rights reserved © 2006, Alcatel Benefits of Distributed Access Border Gateway in the Access  Benoît De Vos Alcatel, May 29 th 2006.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen A Cooperative SIP Infrastructure for Highly.
1 ITEC 809 Securing SIP in VoIP Domain Iyad Alsmairat Supervisor: Dr. Rajan Shankaran.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Skype Connected to a SIP PBX
Session Initiation Protocol (SIP) By: Zhixin Chen.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
DYSWIS1 Managing (VoIP) Applications – DYSWIS Henning Schulzrinne Dept. of Computer Science Columbia University July 2005.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
VoIP and IP conferencing over satellites Workshop on VoIP Technology: Research and Standards for reliable applications PIMRC 08, Cannes France 15 September.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
A Gateway For SIP Event Interworking - Sasu Tarkoma & Thalainayar Balasubramanian Ramya.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
SIP Greg Nelson Duc Pham. SIP Introduction Application-layer (signaling) control protocol for initiating a session among users Application-layer (signaling)
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
By Stephen Tomko H.323 vs. SIP. Internal PBX Call Extension number is dialed PBX receives extension Routes extension Routes call to the phone Call begins.
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
Enhancing the Serviceability and the Availability of IMS-Based Multimedia Services: Avoiding Core Service Failures Mohamed BOUCADAIR France Telecom R&D.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Developing A Sip User Agent Using The Jain Sip Stack. Robert.V Masango Supervisors: Alfredo Terzoli, Ming Hsieh.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
To Build Context-Aware VoIP Support using Session Initiation Protocol By Prasad Vunnam Ritesh Reddy Gunna.
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
Call Control with SIP Brian Elliott, Director of Engineering, NMS.
B2BUA – A New Type of SIP Server Name: Stephen Cipolli Title: System Architect Date: Feb. 12, 2004.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks Jin Tang, Yu Cheng and Yong Hao Department of Electrical and Computer Engineering.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
A Comparative Study of Signaling Protocols for Data Management and Synchronization # Department of Computer Engineering, Kocaeli University.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Center for Information and Communication Technologies Potentials and Challenges of Peer-to-Peer Technology Copenhagen, December 2, 2005 Halldor Matthias.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY [1] VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY ROLL # EC
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl Jaroslav Dočkal.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
VoIP Signaling Protocols A signaling protocol is a common language spoken by telephones and call-management servers, the PSTN, and legacy PBX systems as.
Sumanth Nag Popuri.  Why do we need SIP ?  The protocol  Instant Messaging using SIP  Internet Telephony with SIP  Additional applications  Future.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
SIP-Based or DHT-Based? November 12, 2005 Eunsoo Shim Panasonic Digital Networking Laboratory P2P SIP Ad-hoc Meeting IETF64, Vancouver.
OPTIMIZATION OF SIGNALING TRAFFIC IN CENTRALIZED CONFERENCES USING SIP Submitted by D.NEHRU S.JAYABALAN B.Tech IT II Year.
The Session Initiation Protocol - SIP
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Session Initiation Protocol (SIP)
SECURITY IN DISTRIBUTED FILE SYSTEMS
Service Creation Using SIP
Presentation transcript:

A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA

Introduction  This paper talks about providing a solution for the communication networks which are vulnerable to various attacks (like DOS, eclipse attacks etc). Here the problem is approached by using a SIP server in its normal mode of operation and the user agents of the SIP server forms a P2P network among themselves

INTRODUCTION Major problems with VoIP which are unsolved are reliability, security, QoS, etc. Most of the users use the PSTN which is 100% reliable SIP: Basically known as session initiation protocol. SIP is a signaling protocol which is used in the application layer With SIP, application sessions are established and then we can modify them and finally we can terminate the session. P2P: Peer-to-Peer networks, these networks are mainly used for sharing the files

Cooperative SIP (CoSIP)  Overview Cooperative SIP architecture: CoSIP  It is a hybrid architecture that benefits from the advantages of both server-based and P2P-based SIP networks  SIP User Agents organize themselves into a P2P network  SIP infrastructure and SIP User Agents cooperate in order to provide the best service Improve reliability, survivability, security and lookup performance

How Reliability is Improved in SIP with CoSIP Here traditional method of P2P approach is not followed Here the SIP infrastructure has dedicated SIP servers. P2P network is formed additionally by the SIP user agents. P2P network provide high reliability and self-organization Local failures can be recovered automatically by neighboring peers Data is replicated on a set of nodes. Even large failures affect only a part of the network DoS attacks or network failure attacks are avoided by the DHT, this DHT is used as a backup. Therefore SIP server availability is improved

Implementation of CoSIP Prototype. Design: Here we are using CoSIP as local SIP proxy. Bamboo DHT is used, supporting better routing and improved maintenance. Super node approach is used, here the powerful peers are connected directly to the DTH and the week peers have a indirect connection to DTH

Message Processing: In the cooperative operation mode CoSIP proxy processes the SIP messages. New data structure is created when a Register message is sent by the user agent to the SIP server through the CoSIP proxy. Register message is modified by the CoSIP proxy and then forwarded to the SIP server. In establishing the session with the CoSIP, here when the INVITE message is forwarded to the SIP server by the proxy a message is received by the UAC (“100 Trying” message). This notifies the UAS about the processing of the request Here a modular approach is used for handling the sate machine of the CoSIP proxy.

Expected Results Reliability is improved with the use of the DHT. Bothe the DHT and the server work parallel. So if one fails other one can be used. CoSIP servers are more advanced than the traditional CA. Therefore better security is possible

Conclusion  CoSIP provides a low-cost solution for significantly improving the reliability of SIP networks  Implementation  CoSIP as an external proxy application  compatible to existing SIP networks  Cooperative (server + DHT) as well as DHT-only mode possible  CoSIP is a hybrid architecture which provides better reliability, survivability, security and performance simultaneously

Thank You